Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Analysis of N Category Privacy Models
Marn-Ling SHING, Chen-Chi SHING, Lee-Pin Shing, Lee-Hur Shing
Pages - 342 - 358 | Revised - 15-09-2012 | Published - 25-10-2012
MORE INFORMATION
KEYWORDS
Privacy Model, Confidentiality Model, Information Security Model
ABSTRACT
File sharing becomes popular in social networking and the disclosure of private information without user’s consent can be found easily. Password management becomes increasingly necessary for maintaining privacy policy. Monitoring of violations of a privacy policy is needed to support the confidentiality of information security. This paper extends the analysis of two category confidentiality model to N categories, and illustrates how to use it to monitor the security state transitions in the information security privacy modeling.
1 | Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE. |
2 | Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242. |
A. Rencher, Methods of Multivariate Analysis. New York: John Wiley & Sons, 1995. | |
A. Smith, “Strategic aspects of electronic document encryption”, International Journal of Services and Standards, Vol. 3, No.2, 2007, pp. 203 – 221. | |
A. Smith, “Supply chain management using electronic reverse auctions: a multi-firm case study”, International Journal of Services and Standards, Vol. 2, No.2, 2006, pp. 176 – 189. | |
Bhat, N. (1972). Elements of Applied Stochastic Processes, John Wiley & Sons. | |
CNSS (The Committee on National Security Systems) 4009, 2003. | |
D. Bell and L. LaPadula, “Secure computer system: Unified exposition and multics Interpretation”, Technical Report MTR-2997, Rev. 1, Bedford, MA: MITRE Corporation, 1975. | |
D. Bell and L. LaPadula,, “Secure computer systems: Mathematical foundations”, Technical Report MTR-2574, I, Bedford, MA: MITRE Corporation, 1973. | |
D. Brewer and M. Nash, “ The Chinese wall security policy”, Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989, pp.206-214. | |
D. Clark and D. Wilson, “A comparison of commercial and military security policies”,Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987, pp. 184-194. | |
E. Parzen, Stochastic Processes. San Francisco: Holden-Day., 1967. | |
G. McDaniel, IBM Dictionary of Computing. New York, NY: McGraw-Hill, Inc., 1994. | |
J. Banks, J. Carson, B. Nelson, Discrete Event System Simulation, New Jersey, Prentice Hall, 1996. | |
K Chen, H. Lee and J. Yang, ‘Security Considerations on the Design of Supply Chain Networks’, the Proceedings of Southwest Decision Sciences Institute, Vol. 14, No. 1/2/3, 2006. | |
K. Biba, “Integrity considerations for secure computer systems”, Technical Report MTR-3153,1, Bedford, MA: MITRE Corporation, 1977. | |
K. Chen, M. Shing, C. Shing and H. Lee, “Modeling in Confidentiality and Integrity for a Supply Chain Network,” Communications of the IIMA, 2007. | |
K. Hsu and Z. Zhu, “SAS 99 – Consideration of fraud in a financial statement audit: a new auditing standard”, International Journal of Services and Standards, Vol. 1, No.4, 2005, pp. 414 – 425. | |
M. Aburdene, Computer Simulation of Dynamic Systems, Wm. C. Brown Publishing, 1988. | |
M. Bishop, Computer Security, Addison-Wesley, 2003. | |
M. Lee and T. Chang, “Applying ISO 17799:2005 in information security management”,International Journal of Services and Standards, Vol. 3, No.3, 2007, pp. 352 – 373. | |
M. Molloy, Fundamentals of Performance Modeling. New York: Macmillan Publishing., 1989. | |
M. Shing, C. Shing, K. Chen and H. Lee. (2006). “Security Modeling on the Supply Chain Networks”, Journal of Systemics, Cybernetics and Informatics, 2008 , Vol. 5, No. 5, pp. 53-58. | |
M. Shing, C. Shing, K. Chen and H. Lee. (2006). “Security Modeling on the Supply Chain Networks”, Proceedings of EIST 2006, Orlando, FL. | |
M. Shing, C. Shing, K. Chen and H. Lee. “A Simulation Study of Confidentiality Modeling in a Secured Supply Chain Network”, Proceedings of International Symposium on Intelligent.Information Technology Application conference, Dec. 22-23,2008, Shanghai, China. | |
M. Shing, C. Shing, L. Shing. (2012). “Analysis of a Two Category Confidentiality Model In Information Security”, Journal of Communication and Computer, USA, 3(1), 2012. | |
P. Bremaud, Markov Chains. New York: Springer, 1999. | |
S. Lipner, Non-discretionary control for commercial applications, Proceedings of the 1982 Symposium on Privacy and Security, 2-10, 1982. | |
Dr. Marn-Ling SHING
Taipei Municipal University of Education - Taiwan
shing@tmue.edu.tw
Dr. Chen-Chi SHING
Radford University - United States of America
Mr. Lee-Pin Shing
Virginia Tech - United States of America
Miss Lee-Hur Shing
Virginia Tech - United States of America
|
|
|
|
View all special issues >> | |
|
|